The availability of smartphones is still severely restricted by the limited battery lifetime. To help users understand the energy consumption, major mobile platforms support fine-grained energy profiling for each app. In this paper, we present a new threat, called energy collateral attacks, which can abuse and mislead all existing energy modeling approaches. In particular, energy collateral attacks are able to divulge battery stealthily through interprocess communication, wakelock, and screen. To defend against those attacks, we propose E-Android to accurately profile the energy consumption in a comprehensive manner. E-Android monitors energy collateral related events and maintains energy consumption for relevant apps. We utilize E-Android to measure the energy consumption under the attack of six energy malware and two normal scenarios. While Android fails to disclose all these energy-malware-based attacks, EAndroid can accurately profile energy consumption and reveal the existence of energy malware.
CITATION STYLE
Gao, X., Liu, D., Liu, D., & Wang, H. (2016). On energy security of smartphones. In CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (pp. 148–150). Association for Computing Machinery, Inc. https://doi.org/10.1145/2857705.2857738
Mendeley helps you to discover research relevant for your work.